Machine Learning (ML)-based network intrusion detection systems bring many benefits for enhancing the security posture of an organisation. Many systems have been designed and developed in the research community, often achieving a perfect detection rate when evaluated using certain datasets. However, the high number of academic research has not translated into practical deployments. There are a number of causes behind the lack of production usage. This paper tightens the gap by evaluating the generalisability of a common feature set to different network environments and attack types. Therefore, two feature sets (NetFlow and CICFlowMeter) have been evaluated across three datasets, i.e. CSE-CIC-IDS2018, BoT-IoT, and ToN-IoT. The results showed that the NetFlow feature set enhances the two ML models' detection accuracy in detecting intrusions across different datasets. In addition, due to the complexity of the learning models, the SHAP, an explainable AI methodology, has been adopted to explain and interpret the classification decisions of two ML models. The Shapley values of the features have been analysed across multiple datasets to determine the influence contributed by each feature towards the final ML prediction.
翻译:基于机器学习(ML)的网络入侵探测系统为加强一个组织的安全态势带来了许多好处。许多系统是在研究界设计和开发的,在使用某些数据集进行评估时往往能达到完美的检测率。然而,大量学术研究没有转化为实际部署。缺乏生产使用的原因很多。本文通过评价通用特征集在不同网络环境和攻击类型中的可概括性来缩小差距。因此,对三个数据集,即CSE-CIC-IDS2018、Bot-IoT和ToN-IoT, 进行了两个功能集(NetFlow和CICFLlowMeter)的评价。结果显示,NetFlow特性集提高了两个ML模型在探测不同数据集入侵时的检测准确性。此外,由于学习模型的复杂性,SHAP(可解释的AI方法)已被采用来解释和解释两个ML模型的分类决定。通过多个数据集分析了这些特征的最后值,以确定每个模型对ML的影响。